Senior Security Engineer

Other Jobs To Apply

  • Position Purpose
  • The Sr. Security Engineer is a senior-level employee who, under the direction of the Chief Information Security Officer (CISO), is responsible for designing, building, testing and implementing security solutions within the Renown IT network. The Sr. Security Engineer is expected to have a thorough understanding of complex IT systems and stay up to date with the latest security standards, systems and authentication protocols, as well as best practice security products.
  • The Sr. Security Engineer must be able to plan, analyze, design, configure, test, implement, maintain and support Renown’s computer and network security infrastructure in a manner that is responsive to changes in regulations and risk. This requires knowing the business – a comprehensive awareness of its technology and information needs – which is used to develop and test security structures to protect its systems.
  • The Sr. Security Engineer duties include, but are not limited to:
  • Design, build and implement enterprise-class security systems
  • Align security standards and frameworks with overall business and technology strategy
  • Identify and communicate current and emerging security threats  
  • Design security architecture elements to mitigate threats as they emerge
  • Create solutions that balance business requirements with information and cyber security requirements
  • Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
  • Act as the liaison between Information Security and the IT Architects
  • Train users in implementation or conversion of security systems
  • Nature and Scope
  • 1. Contributes to the enterprise’s security software architecture strategy including the integration of components across multiple environments and platforms (e.g., cloud, on premise, co-location).
  • 2. Optimizes the delivery of security software at the enterprise level to realize an integrated (business/technology) strategy.
  • 3. Ensures that IT architectural decisions are consistent with Information Security policies and standards.
  • 4. Demonstrates the level of alignment between strategic goals and key technology decisions in accordance with the Information Security Roadmap. 
  • 5. Applies a structured approach and methodology for capturing the key information protection views of the business and IT in the context of the enterprise.
  • 6. Enumerates, analyzes, catalogs, and suggests improvements to the strategic, core, and support security services of the enterprise, as needed, to meet strategic and operational goals.
  • 7. Evaluates and presents information that will facilitate effective and timely decision-making through written and oral communication that effectively summarizes findings with recommendations.
  • 8. Creates process models/
Back to blog